summaryrefslogtreecommitdiff
path: root/bitmask/main.go
blob: e303adbff3838a2c37e2f0cae00c3ac433084294 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
// Copyright (C) 2018 LEAP
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program.  If not, see <http://www.gnu.org/licenses/>.

package bitmask

import (
	"bytes"
	"encoding/json"
	"errors"
	"io/ioutil"
	"log"
	"net/http"
	"path"
	"time"
)

const (
	timeout    = time.Second * 15
	url        = "http://localhost:7070/API/"
	headerAuth = "X-Bitmask-Auth"
)

// Bitmask holds the bitmask client data
type Bitmask struct {
	client   *http.Client
	apiToken string
	statusCh chan string
}

// Init the connection to bitmask
func Init() (*Bitmask, error) {
	statusCh := make(chan string)
	client := &http.Client{
		Timeout: timeout,
	}
	apiToken, err := getToken()
	if err != nil {
		return nil, err
	}

	b := Bitmask{client, apiToken, statusCh}
	go b.eventsHandler()
	return &b, nil
}

// GetStatusCh returns a channel that will recieve VPN status changes
func (b *Bitmask) GetStatusCh() chan string {
	return b.statusCh
}

// Close the connection to bitmask
func (b *Bitmask) Close() {
	_, err := b.send("core", "stop")
	if err != nil {
		log.Printf("Got an error stopping bitmaskd: %v", err)
	}
}

func (b *Bitmask) send(parts ...interface{}) (map[string]interface{}, error) {
	resJSON, err := send(b.apiToken, b.client, parts...)
	if err != nil {
		return nil, err
	}
	result, ok := resJSON.(map[string]interface{})
	if !ok {
		return nil, errors.New("Not valid response")
	}
	return result, nil
}

func send(apiToken string, client *http.Client, parts ...interface{}) (interface{}, error) {
	apiSection, _ := parts[0].(string)
	reqBody, err := json.Marshal(parts[1:])
	if err != nil {
		return nil, err
	}
	req, err := http.NewRequest("POST", url+apiSection, bytes.NewReader(reqBody))
	if err != nil {
		return nil, err
	}
	req.Header.Add(headerAuth, apiToken)

	resp, err := client.Do(req)
	if err != nil {
		return nil, err
	}
	defer resp.Body.Close()

	resJSON, err := ioutil.ReadAll(resp.Body)
	if err != nil {
		return nil, err
	}
	return parseResponse(resJSON)
}

func parseResponse(resJSON []byte) (interface{}, error) {
	var response struct {
		Result interface{}
		Error  string
	}
	err := json.Unmarshal(resJSON, &response)
	if response.Error != "" {
		return nil, errors.New(response.Error)
	}
	return response.Result, err
}

func getToken() (string, error) {
	path := path.Join(ConfigPath, "authtoken")
	b, err := ioutil.ReadFile(path)
	return string(b), err
}